RESILIENT DISTRIBUTED STORAGE SYSTEM
A distributed data storage system that includes endpoint nodes, gateway nodes, and one or more gateway name servers. A gateway name server receives from clients resolution requests to resolve to a gateway node and resolves the resolution requests to a gateway node address of a gateway node. A gateway node receives client requests to access an endpoint node and redirects the requests to endpoint nodes identified by a gateway node whose address was resolved to by a gateway name server. An endpoint node receives from a client a retrieval request to retrieve data based on being redirected to the endpoint node. When a retrieval request is received and the endpoint node stores the data, the endpoint node sends the data to the client. When a retrieval request is received and the endpoint node does not store the data, the endpoint node forwards the retrieval request to another endpoint node.
This application claims the benefit of U.S. Patent Application Ser. No. 62/933,248 filed on Nov. 8, 2019, which is hereby incorporated by reference in its entirety.
BACKGROUNDThe modern computing world is increasingly moving from organizations storing their electronic data on their own computer equipment to storing data and performing computations on computers owned by data center operators referred to as cloud computing. Cloud computing is growing rapidly and dominated by a limited number of large companies. Although these companies are generally reliable as centralized entities, they present a single point of failure for any company that relies on their services. The centralization of these computing resources also presents other potential exploits with undesirable outcomes for most stakeholders. For example, a server in a data center may be infected with ransomware (e.g., a type of malware) that exploits a security flaw in the supervisory software that provides overall control of the data center. The ransomware may propagate to other servers and encrypt data that is accessible to those servers using an encryption key. The encrypted data cannot be used by the server until a ransom is paid in exchange for a decryption key that can be used to decrypt the encrypted data.
One approach to removing the single point of failure presented by centralized cloud computing data repositories is decentralized data storage. Decentralized data storage stores data on different computers distributed across geographic areas and organizations so that no one entity presents a single point of control either for the availability of data or for the integrity of their contents. One open source software project that has sought to provide decentralized data storage is the Inter-Planetary File System (IPFS).
Although IPFS is considered by many to be an improvement over prior decentralized data storage, implementations of IPFS have had problems. One problem is that access times are unpredictable because an access request may be routed to indeterminable number of data storage servers. Another problem is the inability to provide asynchronous forward replication of data to ensure data availability against failures.
A system is provided that allows access to distributed storage of data and access to computer resources in a way that is resilient to a single point of failure. In some embodiments, a resilient distributed storage (RDS) system provides access to endpoint nodes of the RDS system that store files of the RDS system. The RDS system includes a gateway to the distributed storage system that includes a collection of gateway nodes. The gateway nodes form a self-healing mesh network which accepts incoming requests from clients for a route an endpoint node to service a request for a resource such as retrieve a file. These gateway nodes are discoverable using a public domain name system (DNS), referred to the gateway DNS. Each gateway node can be under control of an independent entity, and the self-healing mesh network eliminates any single point of failure. The gateway nodes redirect requests from clients (i.e., computer systems) to store and access data by responding, for example, with an HTTP redirect (30×) response to endpoint nodes that provide the resources. These redirect responses route the client to an endpoint node to service the request. Because HTTP sessions based on a redirect are lightweight, the gateway nodes are capable of handling large volumes of requests. The RDS system may be used with Round-Robin DNS (RRDNS) to help distribute the requests evenly among the gateway nodes.
The RDS system allows endpoint nodes to rapidly respond with a very low impact to their resources because they do not process information regarding network topographies. Instead, each endpoint node publishes to the gateway nodes at intervals information regarding its status and availability. Endpoint nodes communicate securely with gateway nodes using a secure file transport protocol (e.g., SSH). Endpoint nodes respond to HTTP requests using secure socket layer (SSL) certificates (issued by a certificate authority) after the endpoint nodes have been added to the RDS system.
Gateway nodes use the status and availability to create an endpoint table of the endpoint nodes and their geographic locations. The gateway nodes, which may each periodically retrieve and store an endpoint table, respond to HTTP requests and redirect the requests to an endpoint node based on an accessibility metric derived from the endpoint table. The accessibility metric may be based on proximity, resource usage, or other metrics. The gateway nodes may select endpoint nodes in a round-robin manner from a set of endpoint nodes that are most accessible. The round-robin manner helps prevent an endpoint node from being overwhelmed with requests for services.
To access data of the RDS system, a gateway node is identified using a gateway DNS that receives a request to access the gateway and responds with a gateway node address of a gateway node to service the requests. The RDS system may select a gateway node in a round-robin manner to help prevent overwhelming a gateway node or a subset of the gateway nodes. The gateway DNS maintain a gateway node round-robin DNS (RRDNS) pool of available gateway nodes.
When an endpoint node receives a request to retrieve a file, the endpoint nodes responds with the file if it is stored locally. If not stored locally, the endpoint node selects an endpoint node from a list of endpoint nodes and forwards the request to one of those endpoint nodes, which may further forward the request to another endpoint node if no longer stored locally. The file is eventually provided to the original endpoint node who forwards the file to the client.
The RDS system may allow clients to store files on endpoint nodes. A console, which is a collection of console nodes, enforces permission to access files based on an application programming interface (API) key or a blockchain account authorization token. To ensure that file is unique and does not already exist on the RDS system, the gateway uses an IPFS multihash function to define the lookup key of a file (or a portion of a file or database record) by a hash of its contents. The most common hashing algorithm for IPFS multihash is SHA-256 but other hashing algorithms may be used, and the algorithm used is denoted in the initial characters of the resulting hash. Because the lookup key is a hash of its contents, changing any part of a file will result in an entirely different hash.
In order to store a file within the RDS system, a client uploads the file to a console node. A console node serves as a management console for the account and data of each client. A console node also exposes an API that allows for streamlining of account manipulation. A console node is accessed via the gateway DNS using a console node RRDNS pool that is distinct from the gateway node RRDNS pool, along with a specific API key or account. The console node sends to a gateway node a request to store the file. The gateway node generates the hash of the file and provides the hash to the console to be forwarded to the client. The client retains this hash for future access to the file.
To store the file at endpoint nodes, the gateway node uses an asynchronous file replication algorithm and endpoint status information reported to it (e.g., periodically) by the various endpoint nodes to determine the number of copies of the file to create. The gateway node then randomly selects this number of endpoint nodes within the system and sends the command, using ProxMox or some similar tool, to these endpoint nodes to each make a local copy the file and add a retention flag for that file. The retention flag indicates that the file should be retained on (“pinned to”) the endpoint node until the flag is cleared.
To delete a file, a client establishes a session with the console in the same manner as for adding (or storing) a file. Assuming the client has permission to delete the file, the client (via the console node) issues a request to a gateway node identified via the gateway DNS. The gateway node broadcasts the request to all endpoint nodes and all other gateway nodes to “unpin” the file by removing the retention flag associated with it. As each node undergoes its own independent garbage collection (e.g., periodically or when a garbage collection criterion is satisfied), it will remove the file.
The RDS system may also allow for the retrieval of files using user-friendly file names rather than using hashes. The hash of a file may be “Qm1dR4dGhNJKfl6o85jbBsflwfYgHHe3sdf518Pf1eGs4r,” but a user may have created the file with the file name “mydocument.pdf.” Moreover, because the file may be retrieved from different endpoint nodes each time it is accessed, the URL returned to client by the gateway DNS to identify the file may be “aa.rds.cloud/Qm1dR4dGhNJKfl6o85jbBsflwfYgHHe3sdf518Pf1eGs4r” on one access and “zz.rds.cloud/ Qm1dR4dGhNJKfl6o85jbBsflwfYgHHe3sdf518Pf1eGs4r” on the next access. The user-friendly file name are provided via consistent URLs rather than URLs that vary from access to access such as “aa.rds.cloud” and “zz.rds.cloud.”
To allow for user-friendly file names, the RDS system may provide a directory of files identified by their user-friendly names. To support providing if user-friendly URLs (e.g., with a consistent host identified and a non-hash file name), the RDS system provides a navigation system that includes a directory DNS with directory DNS nodes and a navigation directory with navigation directory nodes. The navigation directory maintains a mapping of hashes to user-friendly URLs.
To request access to a file, a client requests the directory DNS for an address of a navigation directory node. The directory DNS may be part of the gateway DNS. The client then requests a navigation directory node to retrieve the file identified by its HTTP persistent URL and filename. The navigation directory node looks up the filename and its associated hash requests the gateway DNS for the gateway address of a gateway node. The navigation gateway node then requests the file from the gateway node using HTTP request that includes the hash. The gateway node responds with an HTTP 30× redirect to a named endpoint node.
The RDS system may be used to direct client requests to endpoint nodes to help balance load, by reflecting requests using HTTP 30× responses to rapidly create routes in a manner that is less resource intensive and more resistant to overloading than traditional load balancers. A load reflecting system is comprised of gateway nodes organized in a lightweight reflector mesh for instant redirection to endpoint nodes the provide computer resources such files or services such as via APIs.
The load reflecting process begins with a client requesting a gateway node address from the gateway DNS. The client then sends a request to the gateway node to access an endpoint node by its HTTP address. The gateway node redirects the client to a named endpoint node to service the request.
When an endpoint node is to join the collection of endpoint nodes, the endpoint node registers with a console node. The console node verifies that the endpoint nodes is executing the correct version of the endpoint node software (e.g., using a secure enclave). Once verified, the console node sends to a gateway node a request to provide an authorization token for the endpoint node, receives from the gateway node the authorization token, and sends to the endpoint node the authorization token. The endpoint node uses the authorization token when communicating with a console node and a gateway node. Each endpoint node receives (e.g., periodically) from a console node a list of the endpoint nodes (i.e., a list of peers) to allow an endpoint node to select other endpoint nodes when forwarding data access requests. The gateway nodes also maintain a list of endpoint nodes. The console nodes may periodically ping the endpoint nodes to detect when an endpoint node may be down. Alternatively, the gateway nodes may alternatively ping the endpoint nodes.
Although described primarily in the context of storing files, the RDS system may be used to store data of any type of data organization. For example, the RDS system may be employed to store records of a database system and retrieve individual records.
In some embodiments, the RDS system employs an asynchronous forward replication algorithm and a geo-scale smart reflection routing algorithm. The asynchronous forward replication algorithm based on a formula that gateway nodes use to determine how many replicas of a file are needed to meet the acceptable guidelines for long-term storage of data on endpoint nodes. A suitable formula may be represented by the following equation:
y=ceil(x/((x/a)+b))+c
where y represents the ideal number of replicas to request from the endpoints, x represents the number of endpoint nodes available, a represents the target number of endpoints that the equation seeks to deploy in the system, b represents the growth speed factor where a larger number requires a higher number of nodes before the target number of endpoints (a) is reached, and c represents the additional server margin to allow the minimum number of replicas on endpoints to be increased to accommodate low numbers of endpoint replicas at higher growth speed factors b, with the actual maximum number of replicas requested to endpoints equaling a+c. The RDS system may be implemented may use other formulas such as based on a constant number of endpoint nodes, rate of access to the data (e.g., changing dynamic number), and so on.
The geo-scale smart reflection routing is defined as the method in which a gateway node determines which endpoint node to reflect (redirect) a request towards based on accessibility metrics. The accessibility metric for endpoint node is based on various statistics for the endpoint node such as its internal load, known available bandwidth, and geographic location. The gateway node selects the most accessible endpoint nodes (e.g., top one-third of the endpoint nodes) and selects one of those most accessible endpoint nodes in a round-robin manner. To provide statistics, each endpoint nodes may periodically execute a program to collect and report its statistics to the gateway nodes. The gateway nodes may also collect statistics for an endpoint node such a latency, which depends on the requestor's location. One or more gateway nodes may periodically ping the endpoint nodes to determine latency based on the response to the ping.
Some of the gateway nodes prepare a ranking of the endpoint nodes in a geographic region and publish that ranking. Since different gateway nodes may have different rankings, the gateway nodes employ a consensus algorithm to arrive at a final ranking. The rankings are published (e.g., stored at a central location or at the fastest nodes in a region in a decentralized manner). Each gateway node can then revise its ranking to add (or remove) endpoint nodes that are highly (or not highly rated) across ranking. As each ranking is proposed by a gateway node, the other gateway nodes decide whether to accept this ranking or not based on its similarity to own ranking. When a majority of gateway nodes have accepted a ranking, the gateway nodes use this ranking until new consensus is arrived at. The ranking may be a per region (e.g., continent) ranking or global ranking. Each gateway node may employ a different increment for selecting the endpoint nodes in a round-robin manner. For example, one endpoint node may employ an increment of one, another endpoint node may employ an increment of three, another endpoint node may employ an increment of negative two (e.g., increment in reverse order), and so on.
The computing systems (e.g., network nodes or collections of network nodes) on which the RDS system may be implemented may include a central processing unit, input devices, output devices (e.g., display devices and speakers), storage devices (e.g., memory and disk drives), network interfaces, graphics processing units, cellular radio link interfaces, global positioning system devices, and so on. The input devices may include keyboards, pointing devices, touch screens, gesture recognition devices (e.g., for air gestures), head and eye tracking devices, microphones for voice recognition, and so on. The computing systems may include desktop computers, laptops, tablets, e-readers, personal digital assistants, smartphones, gaming devices, servers, and so on. The computing systems may access computer-readable media that include computer-readable storage media and data transmission media. The computer-readable storage media are tangible storage means that do not include a transitory, propagating signal. Examples of computer-readable storage media include memory such as primary memory, cache memory, and secondary memory (e.g., DVD) and other storage. The computer-readable storage media may have recorded on them or may be encoded with computer-executable instructions or logic that implements the RDS system. The data transmission media are used for transmitting data via transitory, propagating signals or carrier waves (e.g., electromagnetism) via a wired or wireless connection. The computing systems may include a secure crypto-processor as part of a central processing unit for generating and securely storing keys and for encrypting and decrypting data using the keys.
The RDS system may be described in the general context of computer-executable instructions, such as program modules and components, executed by one or more computers, processors, or other devices. Generally, program modules or components include routines, programs, objects, data structures, and so on that perform tasks or implement data types of the RDS system. Typically, the functionality of the program modules may be combined or distributed as desired in various examples. Aspects of the RDS system may be implemented in hardware using, for example, an application-specific integrated circuit (“ASIC”) or field programmable gate array (“FPGA”).
The following paragraphs describe various embodiments of aspects of the RDS system. An implementation of the RDS system may employ any combination of the embodiments. The processing described below may be performed by a computing device with a processor that executes computer-executable instructions stored on a computer-readable storage medium that implements the RDS system.
In some embodiments, one or more computing systems for providing distributed storage of data. The one or more computing systems comprise one or more computer-readable storage mediums for storing computer-executable instructions and one or more processors for executing the computer-executable instructions stored in the one or more computer-readable storage mediums. The instructions include instructions of endpoint nodes, gateway nodes, and one or more gateway name servers. The one or more gateway name servers receive from clients resolution requests to resolve to a gateway node and resolve the resolution requests to a gateway node address of a gateway node. The gateway nodes form a mesh of gateway nodes that receive from clients requests to access an endpoint node and redirect the requests to endpoint nodes, each retrieval request is received by a gateway node whose address was resolved to by a gateway name server. The endpoint nodes receive from a client a retrieval request to retrieve data based on being redirected to an endpoint node by a gateway node; when a retrieval request is received and the endpoint node stores the data, the endpoint node sends the data to the client; and when a retrieval request is received and the endpoint node does not store the data, the endpoint node forwards the retrieval request to another endpoint node. In some embodiments, a retrieval request identifies data by a hash of the data. In some embodiments, when an endpoint node that forwards a retrieval request, the endpoint node receives the data from the other endpoint node and sends the data to the client. In some embodiments, a gateway node identifies a ranking of endpoint nodes based on accessibility and redirects accesses based on the ranking. In some embodiments, n the accesses are redirected in a round-robin manner among highest-ranking endpoint nodes. In some embodiments, a gateway node receives from a client a store request to store data and requests a subset of the endpoint nodes to store data. In some embodiments, 7 a gateway node received a delete request to delete data and requests each endpoint node to delete the data. In some embodiments, a console node enforces permissions of clients to store and delete data. In some embodiments, the gateway name servers resolve to gateway nodes in a round-robin manner. In some embodiments, the computer-executable instructions further include instructions of a navigation directory wherein the navigation directory maps a client data identifier to an endpoint node data identifier that is used by an endpoint node to identify data. In some embodiments, the gateway nodes form a self-healing mesh.
In some embodiments, a method performed by one or more computing systems of one or more gateway nodes that provide access to endpoint nodes that provide access to files stored by endpoint nodes. When a request is received to store a file, the method generates hash of the file; selects selecting a subset of endpoint nodes; and sends to the selected endpoint nodes a request to store the file along with a hash of the file. When a request is received to delete a file identified by a hash, the method sends to each endpoint node a request to delete the file identified by the hash. When a request is received to redirect an access to an endpoint node, the method selects an endpoint node; and redirects he access to the selected endpoint node. In some embodiments, the selecting of an endpoint node is based on a round-robin selection of endpoint nodes. In some embodiments, the round-robin selection is from endpoint nodes that are highly ranked based on their accessibility. In some embodiments, a ranking of endpoint nodes is determined by consensus of gateway nodes.
In some embodiments, a method performed by one or more computing systems of an endpoint node that stores files of a distributed storage system. The method receives retrieval requests to retrieve files identified by hashes, each retrieval request being redirected to the endpoint node by a gateway node, the gateway node being identified by a gateway domain name system; determines determining whether the files are stored at the endpoint node based on hashes of the files; when a file is stored at the endpoint node, provides the file in response to the retrieve request; and when a file is not stored at the endpoint node, forwards the request to another endpoint node; receives the file from the other endpoint node; stores the file at the endpoint node; and provides the file in response to the retrieve request. In some embodiments, the method receives from a gateway node a request to store a file identified by a hash and storing the file locally. In some embodiments, the method receives from a gateway node a request to delete a file identified by a hash and deleting a local copy of the file. In some embodiments, a file has a retention flag and further comprising deleting local copies of file whose retention flag indicates that the file need not be retained. In some embodiments, a gateway node redirects to an endpoint node based on a ranking of accessibility of the endpoint nodes.
In some embodiments, one or more computing systems for load balancing requests to access gateway nodes that redirect access requests to endpoint node. The one or more computing systems include one or more computer-readable storage mediums for storing computer-executable instructions and one or more processors for executing the computer-executable instructions stored in the one or more computer-readable storage mediums. The instruction include instructions of a plurality of gateway nodes that form a mesh of gateway nodes that receive from clients requests to access an endpoint node and redirect the requests to endpoint nodes, each retrieval request is received by a gateway node whose address is resolved to by a gateway name server; and one or more gateway name servers receive from clients resolution requests to resolve to a gateway node and resolve the resolution requests to a gateway node address of a gateway node, the gateway name server maintains a list of gateway nodes and selects a gateway node from the list. In some embodiments, the gateway name servers select gateway nodes from the list in a round-robin manner. In some embodiments, the computer-executable instructions include instructions of a directory name server that receives requests to access of resource identified by a first resource identifier, resolves the resource identifier to a second resource identifier with a gateway name server as a host, and sends the second resource identifier to the client and instructions of a gateway name server that resolves the second resource identifier a third resource identifier with a gateway node as the host. In some embodiments, the resource identifiers are hypertext transport protocol (HTTP) uniform resource locators. In some embodiments, wherein the resources are selected from a group consisting of a file, a web page, and compute resources.
Although the subject matter has been described in language specific to structural features and/or acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. Accordingly, the invention is not limited except as by the appended claims.
Claims
1. One or more computing systems for providing distributed storage of data, the one or more computing systems comprising:
- one or more computer-readable storage mediums for storing computer-executable instructions of: endpoint nodes, gateway nodes, and one or more gateway name servers wherein the one or more gateway name servers receive from clients resolution requests to resolve to a gateway node and resolve the resolution requests to a gateway node address of a gateway node; the gateway nodes form a mesh of gateway nodes that receive from clients requests to access an endpoint node and redirect the requests to endpoint nodes, each retrieval request is received by a gateway node whose address was resolved to by a gateway name server; the endpoint nodes receive from a client a retrieval request to retrieve data based on being redirected to an endpoint node by a gateway node; when a retrieval request is received and the endpoint node stores the data, the endpoint node sends the data to the client; and when a retrieval request is received and the endpoint node does not store the data, the endpoint node forwards the retrieval request to another endpoint node; and
- one or more processors for executing the computer-executable instructions stored in the one or more computer-readable storage mediums.
2. The one or more computing systems of claim 1 wherein a retrieval request identifies data by a hash of the data.
3. The one or more computing system of claim 1 wherein when an endpoint node that forwards a retrieval request, the endpoint node receives the data from the other endpoint node and sends the data to the client.
4. The one or more computing systems of claim 1 wherein a gateway node identifies a ranking of endpoint nodes based on accessibility and redirects accesses based on the ranking.
5. The one or more computing systems of claim 4 wherein the accesses are redirected in a round-robin manner among highest-ranking endpoint nodes.
6. The one or more computing systems of claim 1 wherein a gateway node receives from a client a store request to store data and requests a subset of the endpoint nodes to store data.
7. The one or more computing systems of claim 1 wherein a gateway node received a delete request to delete data and requests each endpoint node to delete the data.
8. The one or more computing systems of claim 1 wherein a console node enforces permissions of clients to store and delete data.
9. The one or more computing systems of claim 1 wherein the gateway name servers resolve to gateway nodes in a round-robin manner.
10. The one or more computing systems of claim 1 wherein the computer-executable instructions further include instructions of a navigation directory wherein the navigation directory maps a client data identifier to an endpoint node data identifier that is used by an endpoint node to identify data.
11. The one or more computing systems of claim 1 wherein the gateway nodes form a self-healing mesh.
12. A method performed by one or more computing systems of one or more gateway nodes that provide access to endpoint nodes that provide access to files stored by endpoint nodes, the method comprising:
- when a request is received to store a file, generating a hash of the file; selecting a subset of endpoint nodes; and sending to the selected endpoint nodes a request to store the file along with a hash of the file;
- when a request is received to delete a file identified by a hash, sending to each endpoint node a request to delete the file identified by the hash;
- when a request is received to redirect an access to an endpoint node, selecting an endpoint node; and redirecting the access to the selected endpoint node.
13. The method of claim 12 further comprising when the selecting of an endpoint node is based on a round-robin selection of endpoint nodes.
14. The method of claim 13 wherein the round-robin selection is from endpoint nodes that are highly ranked based on their accessibility.
15. The method of claim 14 wherein a ranking of endpoint nodes is determined by consensus of gateway nodes.
16. A method performed by one or more computing systems of an endpoint node that stores files of a distributed storage system, the method comprising:
- receiving retrieval requests to retrieve files identified by hashes, each retrieval request being redirected to the endpoint node by a gateway node, the gateway node being identified by a gateway domain name system;
- determining whether the files are stored at the endpoint node based on hashes of the files;
- when a file is stored at the endpoint node, providing the file in response to the retrieve request; and
- when a file is not stored at the endpoint node, forwarding the request to another endpoint node; receiving the file from the other endpoint node; storing the file at the endpoint node; and providing the file in response to the retrieve request.
17. The method of claim 16 further comprising receiving from a gateway node a request to store a file identified by a hash and storing the file locally.
18. The method of claim 17 further comprising receiving from a gateway node a request to delete a file identified by a hash and deleting a local copy of the file.
19. The method of claim 16 wherein a file has a retention flag and further comprising deleting local copies of file whose retention flag indicates that the file need not be retained.
20. The method of claim 16 wherein a gateway node redirects to an endpoint node based on a ranking of accessibility of the endpoint nodes.
21. One or more computing systems for load balancing requests to access gateway nodes that redirect access requests to endpoint node, the one or more computing systems comprising:
- one or more computer-readable storage mediums for storing computer-executable instructions of: a plurality of gateway nodes that form a mesh of gateway nodes that receive from clients requests to access an endpoint node and redirect the requests to endpoint nodes, each retrieval request is received by a gateway node whose address is resolved to by a gateway name server; and one or more gateway name servers receive from clients resolution requests to resolve to a gateway node and resolve the resolution requests to a gateway node address of a gateway node, the gateway name server maintains a list of gateway nodes and selects a gateway node from the list; and
- one or more processors for executing the computer-executable instructions stored in the one or more computer-readable storage mediums.
22. The one or more computing systems of claim 21 wherein the gateway name servers select gateway nodes from the list in a round-robin manner.
23. The one or more computing system of claim 21 wherein the computer-executable instructions include instructions of a directory name server that receives requests to access of resource identified by a first resource identifier, resolves the resource identifier to a second resource identifier with a gateway name server as a host, and sends the second resource identifier to the client and instructions of a gateway name server that resolves the second resource identifier a third resource identifier with a gateway node as the host.
24. The one or more computing system of claim 22 wherein the resource identifiers are hypertext transport protocol (HTTP) uniform resource locators.
25. The one or more computing system of claim 21 wherein the resources are selected from a group consisting of a file, a web page, and compute resources.
Type: Application
Filed: Nov 9, 2020
Publication Date: Aug 19, 2021
Patent Grant number: 11570247
Inventor: Stephanie Marie Sunshine (Seattle, WA)
Application Number: 17/093,395